CVE-2022-33945
📋 TL;DR
This vulnerability allows a privileged user with local access to potentially escalate privileges through improper input validation in Intel Server board and Server System BIOS firmware. It affects systems running vulnerable Intel server hardware BIOS versions. Attackers could gain higher privileges than intended on affected systems.
💻 Affected Systems
- Intel Server Board S2600WF Family
- Intel Server System S2600WF Family
📦 What is this software?
Compute Module Hns2600bpb Firmware by Intel
View all CVEs affecting Compute Module Hns2600bpb Firmware →
Compute Module Hns2600bpb24 Firmware by Intel
View all CVEs affecting Compute Module Hns2600bpb24 Firmware →
Compute Module Hns2600bpblc Firmware by Intel
View all CVEs affecting Compute Module Hns2600bpblc Firmware →
Compute Module Hns2600bpblc24 Firmware by Intel
View all CVEs affecting Compute Module Hns2600bpblc24 Firmware →
Compute Module Hns2600bpblc24r Firmware by Intel
View all CVEs affecting Compute Module Hns2600bpblc24r Firmware →
Compute Module Hns2600bpblcr Firmware by Intel
View all CVEs affecting Compute Module Hns2600bpblcr Firmware →
Compute Module Hns2600bpbr Firmware by Intel
View all CVEs affecting Compute Module Hns2600bpbr Firmware →
Compute Module Hns2600bpq Firmware by Intel
View all CVEs affecting Compute Module Hns2600bpq Firmware →
Compute Module Hns2600bpq24 Firmware by Intel
View all CVEs affecting Compute Module Hns2600bpq24 Firmware →
Compute Module Hns2600bpq24r Firmware by Intel
View all CVEs affecting Compute Module Hns2600bpq24r Firmware →
Compute Module Hns2600bpqr Firmware by Intel
View all CVEs affecting Compute Module Hns2600bpqr Firmware →
Compute Module Hns2600bps Firmware by Intel
View all CVEs affecting Compute Module Hns2600bps Firmware →
Compute Module Hns2600bps24 Firmware by Intel
View all CVEs affecting Compute Module Hns2600bps24 Firmware →
Compute Module Hns2600bps24r Firmware by Intel
View all CVEs affecting Compute Module Hns2600bps24r Firmware →
Compute Module Hns2600bpsr Firmware by Intel
View all CVEs affecting Compute Module Hns2600bpsr Firmware →
Compute Module Liquid Cooled Hns2600bpbrct Firmware by Intel
View all CVEs affecting Compute Module Liquid Cooled Hns2600bpbrct Firmware →
Server System M20ntp1ur304 Firmware by Intel
View all CVEs affecting Server System M20ntp1ur304 Firmware →
Server System M70klp4s2uhh Firmware by Intel
View all CVEs affecting Server System M70klp4s2uhh Firmware →
Server System Mcb2208wfaf5 Firmware by Intel
View all CVEs affecting Server System Mcb2208wfaf5 Firmware →
Server System Vrn2224bpaf6 Firmware by Intel
View all CVEs affecting Server System Vrn2224bpaf6 Firmware →
Server System Vrn2224bphy6 Firmware by Intel
View all CVEs affecting Server System Vrn2224bphy6 Firmware →
Server System Zsb2224bpaf1 Firmware by Intel
View all CVEs affecting Server System Zsb2224bpaf1 Firmware →
⚠️ Risk & Real-World Impact
Worst Case
An attacker with existing privileged access could achieve full system compromise, bypass security controls, install persistent malware, or access sensitive data.
Likely Case
A malicious insider or compromised administrator account could escalate privileges to gain complete control over the server hardware and firmware.
If Mitigated
With proper access controls and monitoring, impact is limited to authorized administrative users who would need to intentionally exploit the vulnerability.
🎯 Exploit Status
Exploitation requires existing privileged access to the system management interface. No public exploit code has been disclosed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: BIOS version 02.01.0021 or later
Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00719.html
Restart Required: Yes
Instructions:
1. Download BIOS update from Intel support site. 2. Follow Intel BIOS update procedures for your specific server model. 3. Apply update through BMC/IPMI interface or bootable media. 4. Reboot server to complete installation.
🔧 Temporary Workarounds
Restrict BMC/IPMI Access
allLimit access to the Baseboard Management Controller and IPMI interface to only authorized administrative networks and users.
Implement Least Privilege
allRestrict local administrative access to only necessary personnel and implement multi-factor authentication for management interfaces.
🧯 If You Can't Patch
- Isolate affected servers in secure network segments with strict access controls
- Implement enhanced monitoring and logging of BIOS/UEFI and management interface access
🔍 How to Verify
Check if Vulnerable:
Check BIOS version in system management interface (BMC/IPMI) or during system boot. Compare against vulnerable versions (before 02.01.0021).
Check Version:
ipmitool mc info (Linux) or check BIOS version in system management web interface
Verify Fix Applied:
Confirm BIOS version is 02.01.0021 or later in system management interface and verify successful update completion.
📡 Detection & Monitoring
Log Indicators:
- Unusual BIOS/UEFI configuration changes
- Multiple failed authentication attempts on management interface
- Unexpected system reboots or firmware update attempts
Network Indicators:
- Unusual traffic to BMC/IPMI management ports (default 623/UDP, 443/TCP)
- Management interface access from unauthorized IP addresses
SIEM Query:
source="bios_logs" AND (event_type="configuration_change" OR event_type="firmware_update")